Preferred Language
Articles
/
joe-378
An Investigation into Thermal Performance of Closed Wet Cooling Tower for Use with Chilled Ceilings in Buildings
...Show More Authors

Chilled ceilings systems offer potential for overall capital savings. The main aim of the present research is to investigate the thermal performance of the indirect contact closed circuit cooling tower, ICCCCT used with chilled ceiling, to gain a deeper knowledge in this important field of engineering which has been traditionally used in various industrial & HVAC systems. To achieve this study, experimental work were implemented for the ICCCCT use with chilled ceiling. In this study the thermal performances of closed wet cooling tower use with chilled ceiling is experimentally and theoretically investigated. Different experimental tests were conducted by varying the controlling parameters to investigate their effects on the ICCCCT characteristics such as tower cooling capacity, chilled ceiling cooling capacity, tower saturation efficiency, mass transfer coefficient and heat transfer coefficient. The following controlling parameters are varied during experiments: spray water flow rate (90 to 150 kg/hr), ambient air wet bulb temperature (12 to 18 oC), and also changing chilled ceiling flow rate (2 to 6 l/min).

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
Iraqi Journal Of Science
Comparison between Zernike moment and central moments for matching problem
...Show More Authors

Moment invariants have wide applications in image recognition since they were proposed.

Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Engineering
Buckling Loads and Effective Length Factor for Non-Prismatic Columns
...Show More Authors

Publication Date
Sat Jun 01 2019
Journal Name
Al-nahrain Journal Of Science
THREE DIMENSIONAL EXPLICIT MODEL FOR COMETARY TAIL IONSINTERACTIONSWITH SOLAR WIND
...Show More Authors

The different interactions between cometary tail and solar wind ions are studied in the present paper based on three-dimensional Lax explicit method. The model used in this research is based on the continuity equations describing the cometary tail-solar wind interactions. Three dimensional system was considered in this paper. Simulation of the physical system was achieved using computer code written using Matlab 7.0. The parameters studied here assumed Halley comet type and include the particle density , the particles velocity v, the magnetic field strength B, dynamic pressure p and internal energy E. The results of the present research showed that the interaction near the cometary nucleus is mainly affected by the new ions added to the

... Show More
Publication Date
Fri Nov 20 2020
Journal Name
Solid State Technology
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Highly-Performed Fuzzily-logicized Edge Detecting Algorithm for Noisy Handwritings
...Show More Authors

The main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
...Show More Authors

View Publication
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Flat Model for Representing Contiguous UTM Coordinates over Iraq Territory
...Show More Authors

The process of converting coordinates is, still, considered an important and difficult issue due to the way of conversion from geographic ellipsoidal system to the projected flat system. The most common method uses contiguous UTM system as one of the most accurate systems in the conversion process, but the users of the
system face problems related to contiguity, especially at the large areas that lie within more than one zone. The aim of the present research is to solve the problem related to the multiple zones coverage found in the Iraqi territory using a mathematical model based on the use of Taylor series. The most accurate conversion equation used in this paper was based on the 4th order polynomial of two variables. The calculatio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 26 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Normalization Bernstein Basis For Solving Fractional Fredholm-Integro Differential Equation
...Show More Authors

In this work, we employ a new normalization Bernstein basis for solving linear Freadholm of fractional integro-differential equations  nonhomogeneous  of the second type (LFFIDEs). We adopt Petrov-Galerkian method (PGM) to approximate solution of the (LFFIDEs) via normalization Bernstein basis that yields linear system. Some examples are given and their results are shown in tables and figures, the Petrov-Galerkian method (PGM) is very effective and convenient and overcome the difficulty of traditional methods. We solve this problem (LFFIDEs) by the assistance of Matlab10.   

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 26 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Minimax Shrunken Technique for Estimate Burr X Distribution Shape Parameter
...Show More Authors

      The present paper concern with minimax shrinkage estimator technique in order to estimate Burr X distribution shape parameter, when prior information about the real shape obtainable as original estimate while known scale parameter.

 Derivation for Bias Ratio, Mean squared error and the Relative Efficiency equations.

 Numerical results and conclusions for the expressions mentioned above were displayed. Comparisons for proposed estimator with most recent works were made.

 

View Publication Preview PDF
Crossref